A two layer model of malware propagation in a search engine context

Malware, which spreads among hosts, brings potential damage to computer systems. Its propagation will even be facilitated when search engine exists. In this paper, we try to dig deeper into the infected time of communities and the malware behaviour in a search engine context. In order to address these problems, a two layer model is proposed for malware propagation via search engine. Derived from this model, we have found that when search engine exists, the reciprocal of infected time in different communities follows power law distribution and the number of malware increases exponentially at the early stage. Both of these hypothesis are validated later by simulations on a real-world dataset.

[1]  Marco Fiore,et al.  Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.

[2]  Sajal K. Das,et al.  This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .

[3]  Guanhua Yan,et al.  Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.

[4]  Jure Leskovec,et al.  {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .

[5]  Min Wu,et al.  Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..

[6]  Jun Zhang,et al.  Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.

[7]  Yang Xiang,et al.  SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks , 2019, IEEE Transactions on Dependable and Secure Computing.

[8]  Angelika Bayer,et al.  A First Course In Probability , 2016 .

[9]  Wanlei Zhou,et al.  Malware Propagations in Wireless Ad Hoc Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[10]  Tianqing Zhu,et al.  Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks , 2019, IEEE Transactions on Dependable and Secure Computing.

[11]  Hasmukh Morarji,et al.  A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts , 2017, IEEE Access.

[12]  Yongzheng Zhang,et al.  SMS Worm Propagation Over Contact Social Networks: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.

[13]  Jun Zhang,et al.  Modeling Propagation Dynamics of Social Network Worms , 2013, IEEE Transactions on Parallel and Distributed Systems.

[14]  Song Guo,et al.  Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[15]  Vasileios Karyotis,et al.  A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks , 2019, IEEE Transactions on Dependable and Secure Computing.

[16]  Xiao-Yang Liu,et al.  Search Engine: A Hidden Power for Virus Propagation in Community Networks , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[17]  Kwang-Cheng Chen,et al.  On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.

[18]  Yang Xiang,et al.  Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[19]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .

[20]  Saurabh Bagchi,et al.  Modeling and automated containment of worms , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).